Skip to content

Commit f5a9a01

Browse files
authored
Merge pull request #191893 from MarkusVi/mon78
mon78
2 parents 007b354 + b5a2877 commit f5a9a01

File tree

3 files changed

+111
-0
lines changed

3 files changed

+111
-0
lines changed
5.96 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Sign-ins using legacy authentication
134+
href: workbook-legacy authentication.md
133135
- name: Risk analysis
134136
href: workbook-risk-analysis.md
135137
- name: Sensitive Operations Report
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
---
2+
3+
title: Sign-ins using legacy authentication workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the sign-ins using legacy authentication workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/16/2022
16+
ms.author: markvi
17+
ms.reviewer: besiler
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Sign-ins using legacy authentication workbook
23+
24+
Have you ever wondered how you can determine whether it is safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question.
25+
26+
This article gives you an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider.
34+
35+
Examples of applications that commonly or only use legacy authentication are:
36+
37+
- Microsoft Office 2013 or older.
38+
39+
- Apps using legacy auth with mail protocols like POP, IMAP, and SMTP AUTH.
40+
41+
42+
Single-factor authentication (for example, username and password) doesn’t provide the required level of protection for today’s computing environments. Passwords are bad as they are easy to guess and humans are bad at choosing good passwords.
43+
44+
45+
Unfortunately, legacy authentication:
46+
47+
- Does not support multi-factor authentication (MFA) or other strong authentication methods.
48+
49+
- Makes it impossible for your organization to move to passwordless authentication.
50+
51+
To improve the security of your Azure AD tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication.
52+
53+
The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
54+
55+
56+
57+
58+
## Sections
59+
60+
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant.
61+
62+
The data collection consists of three steps:
63+
64+
1. Select a legacy authentication protocol, and then select an application to filter by users accessing that application.
65+
66+
2. Select a user to see all their legacy authentication sign-ins to the selected app.
67+
68+
3. View all legacy authentication sign-ins for the user to understand how legacy authentication is being used.
69+
70+
71+
72+
73+
74+
75+
## Filters
76+
77+
78+
This workbook supports multiple filters:
79+
80+
81+
- Time range (up to 90 days)
82+
83+
- User principal name
84+
85+
- Application
86+
87+
- Status of the sign-in (success or failure)
88+
89+
90+
![Filter options](./media/workbook-legacy-authentication/filter-options.png)
91+
92+
93+
## Best practices
94+
95+
96+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
97+
98+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
99+
100+
101+
102+
103+
104+
## Next steps
105+
106+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
107+
108+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
109+

0 commit comments

Comments
 (0)